From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Date: Sat, 21 Mar 2026 16:46:39 +0300 From: Vitaly Chikunov To: ALT Linux kernel packages development Message-ID: References: <20260303143905.80318-1-antohami@altlinux.org> MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20260303143905.80318-1-antohami@altlinux.org> Subject: Re: [d-kernel] [PATCH] [6.12] config: add selinux to CONFIG_LSM X-BeenThere: devel-kernel@lists.altlinux.org X-Mailman-Version: 2.1.12 Precedence: list Reply-To: ALT Linux kernel packages development List-Id: ALT Linux kernel packages development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 21 Mar 2026 13:46:40 -0000 Archived-At: List-Archive: List-Post: On Tue, Mar 03, 2026 at 05:39:05PM +0300, Anton Midyukov wrote: > This is necessary to use Selinux. > Alternatively, can enable it in the kernel cmdline: > lsm=selinux,lockdown,capability,landlock,yama,safesetid,bpf,kiosk,ima,evm > But this clutters the kernel cmdline. > Signed-off-by: Anton Midyukov Applied, thanks. Только передвинул selinux после integrity. > --- > config | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/config b/config > index 76dcac8f970d..ba51640d2b4f 100644 > --- a/config > +++ b/config > @@ -10125,7 +10125,7 @@ CONFIG_EVM_EXTRA_SMACK_XATTRS=y > # CONFIG_DEFAULT_SECURITY_SMACK is not set > # CONFIG_DEFAULT_SECURITY_APPARMOR is not set > CONFIG_DEFAULT_SECURITY_DAC=y > -CONFIG_LSM="landlock,lockdown,yama,loadpin,safesetid,integrity,bpf,altha,kiosk" > +CONFIG_LSM="selinux,landlock,lockdown,yama,loadpin,safesetid,integrity,bpf,altha,kiosk" > > # > # Kernel hardening options > -- > 2.50.1 > > _______________________________________________ > devel-kernel mailing list > devel-kernel@lists.altlinux.org > https://lists.altlinux.org/mailman/listinfo/devel-kernel